Spelling suggestions: "subject:"dempster–shafer theory"" "subject:"kempster–shafer theory""
11 |
Evidence Based Uncertainty Models and Particles Swarm Optimization for Multiobjective Optimization of Engineering SystemsAnnamdas, Kiran Kumar Kishore 28 July 2009 (has links)
The present work develops several methodologies for solving engineering analysis and design problems involving uncertainties and evidences from multiple sources. The influence of uncertainties on the safety/failure of the system and on the warranty costs (to the manufacturer) are also investigated. Both single and multiple objective optimization problems are considered. A methodology is developed to combine the evidences available from single or multiple sources in the presence (or absence) of credibility information of the sources using modified Dempster Shafer Theory (DST) and Fuzzy Theory in the design of uncertain engineering systems. To optimally design a system, multiple objectives, such as to maximize the belief for the overall safety of the system, minimize the deflection, maximize the natural frequency and minimize the weight of an engineering structure under both deterministic and uncertain parameters, and subjected to multiple constraints are considered. We also study the various combination rules like Dempster's rule, Yager's rule, Inagaki's extreme rule, Zhang's center combination rule and Murphy's average combination rule for combining evidences from multiple sources. These rules are compared and a selection procedure was developed to assist the analyst in selecting the most suitable combination rule to combine various evidences obtained from multiple sources based on the nature of evidence sets. A weighted Dempster Shafer theory for interval-valued data (WDSTI) and weighted fuzzy theory for intervals (WFTI) were proposed for combining evidence when different credibilities are associated with the various sources of evidence. For solving optimization problems which cannot be solved using traditional gradient-based methods (such as those involving nonconvex functions and discontinuities), a modified Particle Swarm Optimization (PSO) algorithm is developed to include dynamic maximum velocity function and bounce method to solve both deterministic multi-objective problems and uncertain multi-objective problems (vertex method is used in addition to the modified PSO algorithm for uncertain parameters). A modified game theory approach (MGT) is coupled with the modified PSO algorithm to solve multi-objective optimization problems. In case of problems with multiple evidences, belief is calculated for a safe design (satisfying all constraints) using the vertex method and the modified PSO algorithm is used to solve the multi-objective optimization problems. The multiobjective problem related to the design of a composite laminate simply supported beam with center load is also considered to minimize the weight and maximize buckling load using modified game theory. A comparison of different warranty policies for both repairable and non repairable products and an automobile warranty optimization problem is considered to minimize the total warranty cost of the automobile with a constraint on the total failure probability of the system. To illustrate the methodologies presented in this work, several numerical design examples are solved. We finally present the conclusions along with a brief discussion of the future scope of the research.
|
12 |
An ontology-driven evidence theory method for activity recognition / Uma abordagem baseada em ontologias e teoria da evidência para o reconhecimento de atividadesRey, Vítor Fortes January 2016 (has links)
O reconhecimento de atividaes é vital no contexto dos ambientes inteligentes. Mesmo com a facilidade de acesso a sensores móveis baratos, reconhecer atividades continua sendo um problema difícil devido à incerteza nas leituras dos sensores e à complexidade das atividades. A teoria da evidência provê um modelo de reconhecimento de atividades que detecta atividades mesmo na presença de incerteza nas leituras dos sensores, mas ainda não é capaz de modelar atividades complexas ou mudanças na configuração dos sensores ou do ambiente. Este trabalho propõe combinar abordagens baseadas em modelagem de conhecimento com a teoria da evidência, melhorando assim a construção dos modelos da última trazendo a reusabilidade, flexibilidade e semântica rica da primeira. / Activity recognition is a vital need in the field of ambient intelligence. It is essential for many internet of things applications including energy management, healthcare systems and home automation. But, even with the many cheap mobile sensors envisioned by the internet of things, activity recognition remains a hard problem. This is due to uncertainty in sensor readings and the complexity of activities themselves. Evidence theory models provide activity recognition even in the presence of uncertain sensor readings, but cannot yet model complex activities or dynamic changes in sensor and environment configurations. This work proposes combining knowledge-based approaches with evidence theory, improving the construction of evidence theory models for activity recognition by bringing reusability, flexibility and rich semantics.
|
13 |
An ontology-driven evidence theory method for activity recognition / Uma abordagem baseada em ontologias e teoria da evidência para o reconhecimento de atividadesRey, Vítor Fortes January 2016 (has links)
O reconhecimento de atividaes é vital no contexto dos ambientes inteligentes. Mesmo com a facilidade de acesso a sensores móveis baratos, reconhecer atividades continua sendo um problema difícil devido à incerteza nas leituras dos sensores e à complexidade das atividades. A teoria da evidência provê um modelo de reconhecimento de atividades que detecta atividades mesmo na presença de incerteza nas leituras dos sensores, mas ainda não é capaz de modelar atividades complexas ou mudanças na configuração dos sensores ou do ambiente. Este trabalho propõe combinar abordagens baseadas em modelagem de conhecimento com a teoria da evidência, melhorando assim a construção dos modelos da última trazendo a reusabilidade, flexibilidade e semântica rica da primeira. / Activity recognition is a vital need in the field of ambient intelligence. It is essential for many internet of things applications including energy management, healthcare systems and home automation. But, even with the many cheap mobile sensors envisioned by the internet of things, activity recognition remains a hard problem. This is due to uncertainty in sensor readings and the complexity of activities themselves. Evidence theory models provide activity recognition even in the presence of uncertain sensor readings, but cannot yet model complex activities or dynamic changes in sensor and environment configurations. This work proposes combining knowledge-based approaches with evidence theory, improving the construction of evidence theory models for activity recognition by bringing reusability, flexibility and rich semantics.
|
14 |
An ontology-driven evidence theory method for activity recognition / Uma abordagem baseada em ontologias e teoria da evidência para o reconhecimento de atividadesRey, Vítor Fortes January 2016 (has links)
O reconhecimento de atividaes é vital no contexto dos ambientes inteligentes. Mesmo com a facilidade de acesso a sensores móveis baratos, reconhecer atividades continua sendo um problema difícil devido à incerteza nas leituras dos sensores e à complexidade das atividades. A teoria da evidência provê um modelo de reconhecimento de atividades que detecta atividades mesmo na presença de incerteza nas leituras dos sensores, mas ainda não é capaz de modelar atividades complexas ou mudanças na configuração dos sensores ou do ambiente. Este trabalho propõe combinar abordagens baseadas em modelagem de conhecimento com a teoria da evidência, melhorando assim a construção dos modelos da última trazendo a reusabilidade, flexibilidade e semântica rica da primeira. / Activity recognition is a vital need in the field of ambient intelligence. It is essential for many internet of things applications including energy management, healthcare systems and home automation. But, even with the many cheap mobile sensors envisioned by the internet of things, activity recognition remains a hard problem. This is due to uncertainty in sensor readings and the complexity of activities themselves. Evidence theory models provide activity recognition even in the presence of uncertain sensor readings, but cannot yet model complex activities or dynamic changes in sensor and environment configurations. This work proposes combining knowledge-based approaches with evidence theory, improving the construction of evidence theory models for activity recognition by bringing reusability, flexibility and rich semantics.
|
15 |
Decision Support System (DSS) for construction project risk analysis and evaluation via evidential reasoning (ER)Taroun, Abdulmaten January 2012 (has links)
This research explores the theory and practice of risk assessment and project evaluationand proposes novel alternatives. Reviewing literature revealed a continuous endeavourfor better project risk modelling and analysis. A number of proposals for improving theprevailing Probability-Impact (P-I) risk model can be found in literature. Moreover,researchers have investigated the feasibility of different theories in analysing projectrisk. Furthermore, various decision support systems (DSSs) are available for aidingpractitioners in risk assessment and decision making. Unfortunately, they are sufferingfrom a low take-up. Instead, personal judgment and past experience are mainly used foranalysing risk and making decisions.In this research, a new risk model is proposed through extending the P-I risk model toinclude a third dimension: probability of impact materialisation. Such an extensionreflects the characteristics of a risk, its surrounding environment and the ability ofmitigating its impact. A new assessment methodology is devised. Dempster-ShaferTheory of Evidence (DST) is researched and presented as a novel alternative toProbability Theory (PT) and Fuzzy Sets Theory (FST) which dominate the literature ofproject risks analysis. A DST-based assessment methodology was developed forstructuring the personal experience and professional judgment of risk analysts andutilising them for risk analysis. Benefiting from the unique features of the EvidentialReasoning (ER) approach, the proposed methodology enables analysts to express theirevaluations in distributed forms, so that they can provide degrees of belief in apredefined set of assessment grades based on available information. This is a veryeffective way for tackling the problem of lack of information which is an inherentfeature of most projects during the tendering stage. It is the first time that such anapproach is ever used for handling construction risk assessment. Monetary equivalent isused as a common scale for measuring risk impact on various project success objectives,and the evidential reasoning (ER) algorithm is used as an assessment aggregation toolinstead of the simple averaging procedure which might not be appropriate in allsituations. A DST-based project evaluation framework was developed using projectrisks and benefits as evaluation attributes. Monetary equivalent was used also as acommon scale for measuring project risks and benefits and the ER algorithm as anaggregation tool.The viability of the proposed risk model, assessment methodology and projectevaluation framework was investigated through conducting interviews with constructionprofessionals and administering postal and online questionnaires. A decision supportsystem (DSS) was devised to facilitate the proposed approaches and to perform therequired calculations. The DSS was developed in light of the research findingsregarding the reasons of low take-up of the existing tools. Four validation case studieswere conducted. Senior managers in separate British construction companies tested thetool and found it useful, helpful and easy to use.It is concluded that the proposed risk model, risk assessment methodology and projectevaluation framework could be viable alternatives to the existing ones. Professionalexperience was modelled and utilised systematically for risk and benefit analysis. Thismay help closing the gap between theory and practice of risk analysis and decisionmaking in construction. The research findings recommend further exploration of thepotential applications of DST and ER in construction management domain.
|
16 |
Development of Novel Computational Algorithms for Localization in Wireless Sensor Networks through Incorporation of Dempster-Shafer Evidence TheoryElkin, Colin P. January 2015 (has links)
No description available.
|
17 |
An Evidence Theoretic Approach to Design of Reliable Low-Cost UAVsMurtha, Justin Fortna 30 July 2009 (has links)
Small unmanned aerial vehicles (SUAVs) are plagued by alarmingly high failure rates. Because these systems are small and built at lower cost than full-scale aircraft, high quality components and redundant systems are often eschewed to keep production costs low. This thesis proposes a process to ``design in'' reliability in a cost-effective way. Fault Tree Analysis is used to evaluate a system's (un)reliability and Dempster-Shafer Theory (Evidence Theory) is used to deal with imprecise failure data. Three unique sensitivity analyses highlight the most cost-effective improvement for the system by either spending money to research a component and reduce uncertainty, swap a component for a higher quality alternative, or add redundancy to an existing component. A MATLAB$^{\circledR}$ toolbox has been developed to assist in practical design applications. Finally, a case study illustrates the proposed methods by improving the reliability of a new SUAV design: Virginia Tech's SPAARO UAV. / Master of Science
|
18 |
Modèles statistiques avancés pour la reconnaissance de l’activité physique dans un environnement non contrôlé en utilisant un réseau d’objets connectés / Advanced Statistical Models for Recognizing Physical Activity in an Uncontrolled Environment Using a Network of Connected ObjectsAmroun, Hamdi 26 October 2018 (has links)
Avec l’arrivée des objets connectés, la reconnaissance de l’activité physique connait une nouvelle ère. De nouvelles considérations sont à prendre en compte afin d’aboutir à un meilleur processus de traitement. Dans cette thèse, nous avons exploré le processus de traitement pour la reconnaissance de l’activité physique dans un environnement non contrôlé. Les activités physiques reconnues, avec seulement une centrale inertielle (accéléromètre, gyroscope et magnétomètre), sont dites élémentaires. Les autres types d’activités dépendantes d’un contexte sont dites « basés sur le contexte ». Nous avons extrait la transformée en cosinus discrète (DCT) comme principal descripteur pour la reconnaissance des activités élémentaires. Afin de reconnaitre les activités physiques basées sur le contexte, nous avons défini trois niveaux de granularité : un premier niveau dépendant des objets connectés embarqués (smartphone, smartwatch et samrt TV). Un deuxième niveau concerne l’étude des comportements des participants en interaction avec l’écran de la smart TV. Le troisième niveau concerne l’étude de l’attention des participants envers la TV. Nous avons pris en considération l’aspect imperfection des données en fusionnant les données multi capteurs avec le modèle de Dempster-Shafer. A ce titre, nous avons proposé différentes approches pour calculer et approximer les fonctions de masse. Afin d’éviter de calculer et sélectionner les différents descripteurs, nous avons proposé une approche basée sur l’utilisation d’algorithmes d’apprentissage en profondeur (DNN). Nous avons proposé deux modèles : un premier modèle consiste à reconnaitre les activités élémentaires en sélectionnant la DCT comme principal descripteur (DNN-DCT). Le deuxième modèle consiste à apprendre les données brutes des activités basées sur le contexte (CNN-brutes). L’inconvénient du modèle DNN-DCT est qu’il est rapide mais moins précis, alors que le modèle CNN-brutes est plus précis mais très lent. Nous avons proposé une étude empirique permettant de comparer les différentes méthodes pouvant accélérer l’apprentissage tout en gardant un niveau élevé de précision. Nous avons ainsi exploré la méthode d’optimisation par essaim particulaires (PSO). Les résultats sont très satisfaisants (97%) par rapport à l’apprentissage d’un réseau de neurones profond avec les méthodes d’optimisation classiques telles que la descente de Gradient Stochastique et l’optimisation par Gradient accéléré de Nesterov. Les résultats de nos travaux suggèrent le recours à de bons descripteurs dans le cas où le contexte n’importe peu, la prise en compte de l’imperfection des données capteurs quand le domaine sous-jacent l’exige, l’utilisation de l’apprentissage profond avec un optimiseur permettant d’avoir des modèles très précis et plus rapides. / With the arrival of connected objects, the recognition of physical activity is experiencing a new era. New considerations need to be taken into account in order to achieve a better treatment process. In this thesis, we explored the treatment process for recognizing physical activity in an uncontrolled environment. The recognized physical activities, with only one inertial unit (accelerometer, gyroscope and magnetometer), are called elementary. Other types of context-dependent activities are called "context-based". We extracted the DCT as the main descriptor for the recognition of elementary activities. In order to recognize the physical activities based on the context, we defined three levels of granularity: a first level depending on embedded connected objects (smartphone, smartwatch and samrt TV . A second level concerns the study of participants' behaviors interacting with the smart TV screen. The third level concerns the study of participants' attention to TV. We took into consideration the imperfection aspect of the data by merging the multi sensor data with the Dempster-Shafer model. As such, we have proposed different approaches for calculating and approximating mass functions. In order to avoid calculating and selecting the different descriptors, we proposed an approach based on the use of deep learning algorithms (DNN). We proposed two models: a first model consisting of recognizing the elementary activities by selecting the DCT as the main descriptor (DNN-DCT). The second model is to learn raw data from context-based activities (CNN-raw). The disadvantage of the DNN-DCT model is that it is fast but less accurate, while the CNN-raw model is more accurate but very slow. We have proposed an empirical study to compare different methods that can accelerate learning while maintaining a high level of accuracy. We thus explored the method of optimization by particle swarm (PSO). The results are very satisfactory (97%) compared to deep neural network with stochastic gradients descent and Nesterov accelerated Gradient optimization. The results of our work suggest the use of good descriptors in the case where the context matters little, the taking into account of the imperfection of the sensor data requires that it be used and faster models.
|
19 |
Handling uncertainty in intrusion analysisZomlot, Loai M. M. January 1900 (has links)
Doctor of Philosophy / Department of Computing and Information Sciences / Xinming Ou / Intrusion analysis, i.e., the process of combing through Intrusion Detection System (IDS) alerts and audit logs to identify true successful and attempted attacks, remains a difficult problem in practical network security defense. The primary cause of this problem is the high false positive rate in IDS system sensors used to detect malicious activity. This high false positive rate is attributed to an inability to differentiate nearly certain attacks from those that are merely possible. This inefficacy has created high uncertainty in intrusion analysis and consequently causing an overwhelming amount of work for security analysts. As a solution, practitioners typically resort to a specific IDS-rules set that precisely captures specific attacks. However, this results in failure to discern other forms of the targeted attack because an attack’s polymorphism reflects human intelligence. Alternatively, the addition of generic rules so that an activity with remote indication of an attack will trigger an alert, requires the security analyst to discern true alerts from a multitude of false alerts, thus perpetuating the original problem. The perpetuity of this trade-off issue is a dilemma that has puzzled the cyber-security community for years.
A solution to this dilemma includes reducing uncertainty in intrusion analysis by making IDS-nearly-certain alerts prominently discernible. Therefore, I propose alerts prioritization, which can be attained by integrating multiple methods. I use IDS alerts correlation by building attack scenarios in a ground-up manner. In addition, I use Dempster-Shafer Theory (DST), a non-traditional theory to quantify uncertainty, and I propose a new method for fusing non-independent alerts in an attack scenario. Finally, I propose usage of semi-supervised learning to capture an organization’s contextual knowledge, consequently improving prioritization. Evaluation of these approaches was conducted using multiple datasets. Evaluation results strongly indicate that the ranking provided by the approaches gives good prioritization of IDS alerts based on their likelihood of indicating true attacks.
|
20 |
Data Fusion for Materials Location Estimation in ConstructionNavabzadeh Razavi, Saiedeh 29 April 2010 (has links)
Effective automated tracking and locating of the thousands of materials on construction sites improves material distribution and project performance and thus has a significant positive impact on construction productivity. Many locating technologies and data sources have therefore been developed, and the deployment of a cost-effective, scalable, and easy-to-implement materials location sensing system at actual construction sites has very recently become both technically and economically feasible. However, considerable opportunity still exists to improve the accuracy, precision, and robustness of such systems. The quest for fundamental methods that can take advantage of the relative strengths of each individual technology and data source motivated this research, which has led to the development of new data fusion methods for improving materials location estimation.
In this study a data fusion model is used to generate an integrated solution for the automated identification, location estimation, and relocation detection of construction materials. The developed model is a modified functional data fusion model. Particular attention is paid to noisy environments where low-cost RFID tags are attached to all materials, which are sometimes moved repeatedly around the site. A portion of the work focuses partly on relocation detection because it is closely coupled with location estimation and because it can be used to detect the multi-handling of materials, which is a key indicator of inefficiency.
This research has successfully addressed the challenges of fusing data from multiple sources of information in a very noisy and dynamic environment. The results indicate potential for the proposed model to improve location estimation and movement detection as well as to automate the calculation of the incidence of multi-handling.
|
Page generated in 0.0961 seconds